Notable Changes to NERC Reliability Standard CIP-005-5



Similar documents
Notable Changes to NERC Reliability Standard CIP-010-3

Cyber Security Compliance (NERC CIP V5)

Summary of CIP Version 5 Standards

NERC CIP VERSION 5 COMPLIANCE

CIP Cyber Security Electronic Security Perimeter(s)

Redesigning automation network security

CIP R2 BES Assets Containing Low Impact BCS. Lisa Wood, CISA, CBRA, CBRM Compliance Auditor Cyber Security

E-Commerce Security Perimeter (ESP) Identification and Access Control Process

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

Cyber Security Standards Update: Version 5

Cyber Security Standards: Version 5 Revisions. Security Reliability Program 2015

Lessons Learned CIP Reliability Standards

Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor Cyber Security

Cyber Security for NERC CIP Version 5 Compliance

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

CIP Electronic Security Perimeter (ESP) - Dan Mishra FRCC Compliance Workshop May 09-13, 2011

GE Measurement & Control. Cyber Security for NERC CIP Compliance

CMPT 471 Networking II

RuggedCom Solutions for

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

WORKING WITH WINDOWS FIREWALL IN WINDOWS 7

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Safety Share Who is Cleco? CIP-005-3, R5 How What

TOP 10 CHALLENGES. With suggested solutions

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Utility Modernization Cyber Security City of Glendale, California

ISERink Overview. Version 1.1. February 1, 2015

Security Considerations for DirectAccess Deployments. Whitepaper

SecFlow Security Appliance Review

F-Secure Messaging Security Gateway. Deployment Guide

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Network Defense Tools

Table of Contents. Figures:

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

CIP v5/v6 Implementation Plan CIP v5 Workshop. Tony Purgar October 2-3, 2014

Core Protection Suite

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

152 FERC 61,054 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. 18 CFR Part 40. [Docket No. RM ]

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

NERC Cyber Security Standards

WHITE PAPER CYBER SECURITY AND ELECTRIC UTILITY COMMUNICATIONS WHAT NERC/CIP MEANS FOR YOUR MICROWAVE

Serial Deployment Quick Start Guide

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Firewalls & Intrusion Detection

LOOK BEHIND THE SCENES: WINDOWS SERVER 2012 FIREWALL AT VOLKSWAGEN AG

2012 CIP Spring Compliance Workshop May Testing, Ports & Services and Patch Management

NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

Verizon Firewall. 1 Introduction. 2 Firewall Home Page

KEY CONSIDERATIONS FOR MIGRATING TO THE VERSION 5 NERC CIP CYBER SECURITY STANDARDS

Verve Security Center

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

Maximize Security to Minimize Compliance Costs. Technical Solutions Focused Webinar July 28, 2015 Sponsored by Waterfall Security Solutions

TRIPWIRE NERC SOLUTION SUITE

Secure Substation Automation for Operations & Maintenance

Reclamation Manual Directives and Standards

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008

John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

CIP Cyber Security Security Management Controls

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

AURORA Vulnerability Background

Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method

Automating NERC CIP Compliance for EMS. Walter Sikora 2010 EMS Users Conference

LogRhythm and NERC CIP Compliance

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Ovation Security Center Data Sheet

Cyber Security Standards Update: Version 5 with Revisions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Section 12 MUST BE COMPLETED BY: 4/22

Configuration Guide for Exchange 2003, 2007 and 2010

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Using Remote Desktop Clients

Strong Security in NERC CIP Version 5: Unidirectional Security Gateways

Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry)

PCI Requirements Coverage Summary Table

Maruleng Local Municipality

Deployment Guide. For the latest version of this document please go to:

Consensus Policy Resource Community. Lab Security Policy

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

NERC CIP Compliance Gaining Oversight with ConsoleWorks

NERC CIP Version 5 and the PI System

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

Network Agent Quick Start

PCI Requirements Coverage Summary Table

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks

Technology Solutions for NERC CIP Compliance June 25, 2015

VMware vcloud Air Networking Guide

Training Course on Network Administration

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Ovation Security Center Data Sheet

Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed)

Password Reset PRO INSTALLATION GUIDE

Transcription:

MIDWEST RELIABILITY ORGANIZATION Notable Changes to NERC Reliability Standard CIP-005-5 Electronic Security Perimeter(s) Bill Steiner MRO Principal Risk Assessment and Mitigation Engineer MRO CIP Version 5 Workshop February 12 and 18, 2015 Improving RELIABILITY and mitigating RISKS to the Bulk Power System

Agenda New concepts introduced in CIP-005-5 Electronic Security Perimeter Definition Bulk Electric System Cyber Systems Access Requirements Method(s) for detecting malicious communications NERC Lessons Learned 2

New Concepts Introduced in CIP-005-5 Electronic Security Perimeter Focus on Electronic Security Perimeters (ESP) definition Security Requirements have moved to CIP-007 New terms defined (See NERC Glossary of Terms for full definition) PCA Protected Cyber Assets. These are non-bca which get BCA protection by nature of their network connectivity (High Water Mark). ERC External Routable Connectivity. Many of the applicable requirements are determined by the characteristic of having bi-directional routable connectivity outside of the ESP. EACMS Electronic Access Control or Monitoring Systems. Firewalls, authentication servers, log monitoring and alerting systems, etc. Interactive Remote Access User initiated access by a routable protocol from outside of an ESP. 3

New Concepts introduced in CIP-005-5 Bulk Electric System Cyber Systems All Bulk Electric System Cyber Systems (BCS) connected to a network via a routable protocol must be within an ESP (CIP-005-5 R1) If a BCS within an ESP has External Routable Connectivity, an Electronic Access Point (EAP) must be identified (CIP-005-5 R1) Dial-up Connectivity (POTS) will need to perform authentication and also be identified Direct serial, non-routable connections are not included (typically leased line communication) Electronic Access Point (EAP) is now an interface (previously an asset) (see NERC glossary) 4

New Concepts introduced in CIP-005-5 Access Requirements Inbound and Outbound access permissions/alerting are now explicitly required (CIP-005-5 R1) Deny by default, and provide justification for allowed traffic Rules which allow outgoing traffic to any address (unrestricted) will be heavily scrutinized Critical for the identification and reducing impact of zero day viruses Interactive Remote Access must be through an Intermediate System (CIP-005-5 R2) Detail in Lesson Learned discussion The Guidelines and Technical Basis adds If the dial-up connectivity is used for Interactive Remote Access, then Requirement R2 also applies This does not seem to be implicit in the Requirements section NERC advice in progress 5

New Concepts introduced in CIP-005-5 Method(s) for Detecting Malicious Communications One or more methods for detecting known or suspected malicious communications for both inbound and outbound communication Control Centers only Should be able to detect unnecessary communication in the event of a misconfigured firewall Watch for advice if this functionally is performed on same hardware as firewall To meet this Requirement, FERC Order No. 706 stated that it is in the public interest to require a responsible entity to implement two or more distinct security measures when constructing an electronic security perimeter. 51 The Commission believes that a responsible entity cannot meet the goal of defense in depth as required by the Commission with a single electronic device, because a single electronic device is easier to bypass than multiple devices. Therefore, we clarify that two or more separate and distinct electronic devices are necessary to implement the Commission s defense in depth requirements. Possible solution configure a separate TAP interface which is located within the ESP. 6

New Concepts introduced in CIP-005-5 Method(s) for Detecting Malicious Communications One or more methods for detecting known or suspected malicious communications for both inbound and outbound communication (continued) From WECC Lesson Learned Presentation 7

Related NERC Lessons Learned Interactive Remote Access Lesson Learned posted for comments EACMS Mixed Trust Lesson Learned posted for comments Virtual Environments (Network, Server, SAN) Lesson Learned in progress External Routable Connectivity Lesson Learned in progress 8

What is Interactive Remote Access? Interactive Remote Access Lesson Learned User-initiated by a person using routable protocol Access originating from outside an ESP Access not originating from an Intermediate System or EAP Interactive Remote Access must be through an Intermediate System Intermediate System can not be in an ESP 9

Requirements and Considerations Interactive Remote Access Lesson Learned Requirements Use an Intermediate System such that the Cyber Asset initiating Interactive Remote Access does not directly access an applicable Cyber Asset (Part 2.1) Use encryption that terminates at an Intermediate System for all Interactive Remote Access (Part 2.2) Use multi-factor (i.e., at least two) authentication to manage all IRA sessions (Part 2.3) Considerations Intermediate Systems can access Cyber Assets inside the ESP as well as outside the ESP (i.e., one Intermediate System can be used to access Cyber Assets of different impact ratings) Intermediate Systems are considered an EACMS (per NERC Glossary) for security requirements 10

Example of typical Interactive Remote Access from NERC Lesson Learned: 11

EACMS Mixed Trust Authentication EACMS Mixed Trust Lesson Learned The Lesson Learned addresses: When BES Cyber Systems and corporate systems share an authentication mechanism, such as Microsoft active directory, the resulting environment is considered to be a mixed trust environment If an entity chooses to use corporate active directory servers to perform the access control function to ESP or BES Cyber Systems, the servers are, by definition, Electronic Access Control and Monitoring Systems (EACMS) associated with one or more BES Cyber Systems An Entity may elect to reduce the compliance burden on corporate servers by avoiding this mixed trust environment by having dedicated CIP Active Directory servers 12

EACMS Mixed Trust Authentication EACMS Mixed Trust Lesson Learned EACMS Mixed Trust Authentication (continued) 13

Network Communication Virtual Environments Lesson Learned Lesson Learned documents for network virtualization are still in progress Please watch for documents as they become available Topics of Interest: Virtualization (VLANS, Virtual Machines) Implementation of a switch as an EAP 14

Network Communication Virtual Environments Lesson Learned MRO Recommended Approach: Consider assigning Network Switches supporting Control Center servers as BCA Has a 15 Minute impact VLANS are welcome (possibly even recommended) but all networks within the switch need to be within a defined ESP Multiple VLANS of equal trust (High Water Mark) can be within one ESP Implement a separate device to serve as EAP 15

Network Communication Virtual Environments Lesson Learned MRO Recommended Approach (continued) Network switches used exclusively for non real-time applications (engineer support network) would not be classified as BCA PCA (preferred), EAP (wait for Lesson Learned) Level 2 Network Switch with mixed trust VLANs will not meet requirements Implementation of a Network Switch as an EAP (if allowed, not recommended) will be complicated For example, switches with mixed trust level must meet all Electronic Access Point requirements Will need to be at least Level 3 Switch 16

Network Communication Virtual Environments Lesson Learned Implementation of a Network Switch as an EAP (if allowed, not recommended) will be complicated (continued) For example, every interface into the ESP would need: Ingress/egress controls and monitoring One or more methods for detecting known or suspected malicious communications for both inbound and outbound communication (If at a Control Center) (CIP-005-5 Part 1.5) Virtual Machines as BCS Lesson Learned documents for Virtual Machines are still in progress Please watch for documents as they become available MRO Recommended Approach: If a BCS is on a Virtual Machine all other VMs within the physical chassis and the hypervisor should be considered part of the same or equal impact ESP 17

External Routable Connectivity External Routable Connectivity Lesson Learned External Routable Connectivity (ERC) ERC determination is straight forward for typical network attached BCS ERC is determined at the BCA, not BCS If a BCA has a network interface in use, and is not within a physically islanded subnet, it has ERC If a BCS is determined to have an ERC, the applicable CIP requirements increases (most notably at right) 18

ERC connectivity to Serial connected BCS External Routable Connectivity Lesson Learned Lesson Learned documents for this type of External Routable Connectivity are still in progress Please watch for documents as they become available MRO recommends that concepts similar to determining ERC for Low Impact BCS (LERC) (CIP-003-7) are applied 19

ERC connectivity to Serial connected BCS Example External Routable Connectivity Lesson Learned Recommended example of ERC - Relay Engineer has full console access to device via ERC Serial 20

No ERC connectivity to Serial Example External Routable Connectivity Lesson Learned Example of no ERC - A protocol break prevents Relay Engineer from full console access to device via ERC 21

Questions? 22